Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Move SSL cipher string configuration before loading the certification chain #676

Merged
merged 1 commit into from
Dec 23, 2023

Conversation

matesh
Copy link
Contributor

@matesh matesh commented Aug 24, 2022

After upgrading to the recent release of Python 3.10 connection to brokers with previous generation self-signed SSL keys no longer work, when connecting, the SSL library throws an error:

ssl.SSLError: [SSL: CA_MD_TOO_WEAK] ca md too weak

Changing the broker keys in some use cases may not be possible. The most used workaround I found online was to configure the openssl library in the OS/Docker image level to drop the security level globally and allow weak keys to be used, with solutions such as RUN sed -i 's/DEFAULT@SECLEVEL=2/DEFAULT@SECLEVEL=1/' /etc/ssl/openssl.cnf. I find this inappropriate for the sake of a single connection in the system.

The obvious solution is that when configuring SSL for the paho-mqtt client connection, the client.tls_set() method allows cipher strings to be defined for the context. Using the cipher string DEFAULT@SECLEVEL=1 should have the same effect as when being configured globally as above, however, I found that the exception was still raised.

After some investigation I found that in the client.tls_set() method the cipher string is added to the SSL context as a very last step, after the key chain is loaded into the context. When the keys are being loaded, the SSL library throws the exception and the program flow never arrives to the cipher configuration which would allow those weak keys to be used.

This PR moves the cipher string configuration to the beginning of the context configuration process, so all subsequent context configuration will respect any cipher strings specification.

Signed-off-by: Mate Szabo matesosh@gmail.com

Signed-off-by: Mate Szabo <matesosh@gmail.com>
@matesh
Copy link
Contributor Author

matesh commented Aug 24, 2022

My github, commit, PR and eclipse email addresses are the same and the necessary legal agreement on the Eclipse website is signed. Any further information about what other agreements need to be agreed to would be appreciated.

(edit) This seems to have solved itself over time

@PierreF PierreF merged commit 6ba3ff0 into eclipse:master Dec 23, 2023
@PierreF
Copy link
Contributor

PierreF commented Dec 23, 2023

Thank for your contribution.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants